OFFLINE AND ONLINE SIGNATURE VERIFICATION SYSTEMS: A SURVEY

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

Offline Signature Verification System Based on the Online Data

Most of the signature verification work done in the past years focused either on offline or online approaches. In this paper, a different methodology is proposed, where the online reference data acquired through a digitizing tablet serves as the basis for the segmentation process of the corresponding scanned offline data. Local windows are built over the image through a self-adjustable learning...

متن کامل

OFFLINE SIGNATURE VERIFICATION SYSTEM - A REVIEW Pooja

The person’s signature is an important biometric attribute which is used for authentication and identification of individual. Today, Signature verification is one of the most important features. There are many parameters for security checking like password, pin code, but signature recognition is the very popular because it is quite accurate and cost efficient too. On the other hand, it’s very d...

متن کامل

Improved Online/Offline Signature Schemes

The notion of on-line/off-line signature schemes was introduced in 1990 by Even, Goldreich and Micali. They presented a general method for converting any signature scheme into an on-line/off-line signature scheme, but their method is not very practical as it increases the length of each signature by a quadratic factor. In this paper we use the recently introduced notion of a trapdoor hash funct...

متن کامل

Efficient Certificateless Online/Offline Signature

Public key cryptography usually is computationally more expensive than symmetric key systems. Due to this low power or resource constrained devices cannot make use of public key cryptosystems easily. There is a need for high security in these devices since many of these devices perform complex tasks which includes interaction with third party cloud infrastructures. These cloud infrastructures a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2014

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2014.0315064